pam_access.8 5.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. '\" t
  2. .\" Title: pam_access
  3. .\" Author: [see the "AUTHORS" section]
  4. .\" Generator: DocBook XSL Stylesheets v1.79.1 <http://docbook.sf.net/>
  5. .\" Date: 09/03/2021
  6. .\" Manual: Linux-PAM Manual
  7. .\" Source: Linux-PAM Manual
  8. .\" Language: English
  9. .\"
  10. .TH "PAM_ACCESS" "8" "09/03/2021" "Linux-PAM Manual" "Linux-PAM Manual"
  11. .\" -----------------------------------------------------------------
  12. .\" * Define some portability stuff
  13. .\" -----------------------------------------------------------------
  14. .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  15. .\" http://bugs.debian.org/507673
  16. .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html
  17. .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  18. .ie \n(.g .ds Aq \(aq
  19. .el .ds Aq '
  20. .\" -----------------------------------------------------------------
  21. .\" * set default formatting
  22. .\" -----------------------------------------------------------------
  23. .\" disable hyphenation
  24. .nh
  25. .\" disable justification (adjust text to left margin only)
  26. .ad l
  27. .\" -----------------------------------------------------------------
  28. .\" * MAIN CONTENT STARTS HERE *
  29. .\" -----------------------------------------------------------------
  30. .SH "NAME"
  31. pam_access \- PAM module for logdaemon style login access control
  32. .SH "SYNOPSIS"
  33. .HP \w'\fBpam_access\&.so\fR\ 'u
  34. \fBpam_access\&.so\fR [debug] [nodefgroup] [noaudit] [accessfile=\fIfile\fR] [fieldsep=\fIsep\fR] [listsep=\fIsep\fR]
  35. .SH "DESCRIPTION"
  36. .PP
  37. The pam_access PAM module is mainly for access management\&. It provides logdaemon style login access control based on login names, host or domain names, internet addresses or network numbers, or on terminal line names, X
  38. \fI$DISPLAY\fR
  39. values, or PAM service names in case of non\-networked logins\&.
  40. .PP
  41. By default rules for access management are taken from config file
  42. /etc/security/access\&.conf
  43. if you don\*(Aqt specify another file\&. Then individual
  44. *\&.conf
  45. files from the
  46. /etc/security/access\&.d/
  47. directory are read\&. The files are parsed one after another in the order of the system locale\&. The effect of the individual files is the same as if all the files were concatenated together in the order of parsing\&. This means that once a pattern is matched in some file no further files are parsed\&. If a config file is explicitly specified with the
  48. \fBaccessfile\fR
  49. option the files in the above directory are not parsed\&.
  50. .PP
  51. If Linux PAM is compiled with audit support the module will report when it denies access based on origin (host, tty, etc\&.)\&.
  52. .SH "OPTIONS"
  53. .PP
  54. \fBaccessfile=\fR\fB\fI/path/to/access\&.conf\fR\fR
  55. .RS 4
  56. Indicate an alternative
  57. access\&.conf
  58. style configuration file to override the default\&. This can be useful when different services need different access lists\&.
  59. .RE
  60. .PP
  61. \fBdebug\fR
  62. .RS 4
  63. A lot of debug information is printed with
  64. \fBsyslog\fR(3)\&.
  65. .RE
  66. .PP
  67. \fBnoaudit\fR
  68. .RS 4
  69. Do not report logins from disallowed hosts and ttys to the audit subsystem\&.
  70. .RE
  71. .PP
  72. \fBfieldsep=\fR\fB\fIseparators\fR\fR
  73. .RS 4
  74. This option modifies the field separator character that pam_access will recognize when parsing the access configuration file\&. For example:
  75. \fBfieldsep=|\fR
  76. will cause the default `:\*(Aq character to be treated as part of a field value and `|\*(Aq becomes the field separator\&. Doing this may be useful in conjunction with a system that wants to use pam_access with X based applications, since the
  77. \fBPAM_TTY\fR
  78. item is likely to be of the form "hostname:0" which includes a `:\*(Aq character in its value\&. But you should not need this\&.
  79. .RE
  80. .PP
  81. \fBlistsep=\fR\fB\fIseparators\fR\fR
  82. .RS 4
  83. This option modifies the list separator character that pam_access will recognize when parsing the access configuration file\&. For example:
  84. \fBlistsep=,\fR
  85. will cause the default ` \*(Aq (space) and `\et\*(Aq (tab) characters to be treated as part of a list element value and `,\*(Aq becomes the only list element separator\&. Doing this may be useful on a system with group information obtained from a Windows domain, where the default built\-in groups "Domain Users", "Domain Admins" contain a space\&.
  86. .RE
  87. .PP
  88. \fBnodefgroup\fR
  89. .RS 4
  90. User tokens which are not enclosed in parentheses will not be matched against the group database\&. The backwards compatible default is to try the group database match even for tokens not enclosed in parentheses\&.
  91. .RE
  92. .SH "MODULE TYPES PROVIDED"
  93. .PP
  94. All module types (\fBauth\fR,
  95. \fBaccount\fR,
  96. \fBpassword\fR
  97. and
  98. \fBsession\fR) are provided\&.
  99. .SH "RETURN VALUES"
  100. .PP
  101. PAM_SUCCESS
  102. .RS 4
  103. Access was granted\&.
  104. .RE
  105. .PP
  106. PAM_PERM_DENIED
  107. .RS 4
  108. Access was not granted\&.
  109. .RE
  110. .PP
  111. PAM_IGNORE
  112. .RS 4
  113. \fBpam_setcred\fR
  114. was called which does nothing\&.
  115. .RE
  116. .PP
  117. PAM_ABORT
  118. .RS 4
  119. Not all relevant data or options could be gotten\&.
  120. .RE
  121. .PP
  122. PAM_USER_UNKNOWN
  123. .RS 4
  124. The user is not known to the system\&.
  125. .RE
  126. .SH "FILES"
  127. .PP
  128. /etc/security/access\&.conf
  129. .RS 4
  130. Default configuration file
  131. .RE
  132. .SH "SEE ALSO"
  133. .PP
  134. \fBaccess.conf\fR(5),
  135. \fBpam.d\fR(5),
  136. \fBpam\fR(8)\&.
  137. .SH "AUTHORS"
  138. .PP
  139. The logdaemon style login access control scheme was designed and implemented by Wietse Venema\&. The pam_access PAM module was developed by Alexei Nogin <alexei@nogin\&.dnttm\&.ru>\&. The IPv6 support and the network(address) / netmask feature was developed and provided by Mike Becher <mike\&.becher@lrz\-muenchen\&.de>\&.